| /third_party/python/Modules/_ssl/ |
| H A D | cert.c | 15 #include "clinic/cert.c.h" 18 newCertificate(PyTypeObject *type, X509 *cert, int upref) in newCertificate() argument 23 assert(cert != NULL); in newCertificate() 30 X509_up_ref(cert); in newCertificate() 32 self->cert = cert; in newCertificate() 39 _PySSL_CertificateFromX509(_sslmodulestate *state, X509 *cert, int upref) in _PySSL_CertificateFromX509() argument 41 return newCertificate(state->PySSLCertificate_Type, cert, upref); in _PySSL_CertificateFromX509() 56 X509 *cert = sk_X509_value(stack, i); in _PySSL_CertificateFromX509Stack() local 57 PyObject *ocert = _PySSL_CertificateFromX509(state, cert, upre in _PySSL_CertificateFromX509Stack() [all...] |
| /third_party/node/deps/openssl/openssl/crypto/ess/ |
| H A D | ess_lib.c | 18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, 21 const X509 *cert, 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init() 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument 66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init() 81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init() 88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init() 136 ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, const X509 *cert, int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument 197 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) ess_issuer_serial_cmp() argument 220 const X509 *cert; find() local [all...] |
| /third_party/openssl/crypto/ess/ |
| H A D | ess_lib.c | 18 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, 21 const X509 *cert, 42 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_new_init() local 44 if ((cid = ESS_CERT_ID_new_init(cert, 1)) == NULL in OSSL_ESS_signing_cert_new_init() 57 static ESS_CERT_ID *ESS_CERT_ID_new_init(const X509 *cert, in ESS_CERT_ID_new_init() argument 66 if (!X509_digest(cert, EVP_sha1(), cert_sha1, NULL)) in ESS_CERT_ID_new_init() 81 if ((name->d.dirn = X509_NAME_dup(X509_get_issuer_name(cert))) == NULL) in ESS_CERT_ID_new_init() 88 ASN1_INTEGER_dup(X509_get0_serialNumber(cert))) == NULL) in ESS_CERT_ID_new_init() 119 X509 *cert = sk_X509_value(certs, i); in OSSL_ESS_signing_cert_v2_new_init() local 121 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, in OSSL_ESS_signing_cert_v2_new_init() 136 ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, const X509 *cert, int set_issuer_serial) ESS_CERT_ID_V2_new_init() argument 197 ess_issuer_serial_cmp(const ESS_ISSUER_SERIAL *is, const X509 *cert) ess_issuer_serial_cmp() argument 220 const X509 *cert; find() local [all...] |
| /base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/ |
| H A D | trusted_root_ca_test.cpp | 80 * @tc.desc: The static function will return object of matched cert;
90 X509* cert = nullptr;
in HWTEST_F() local 91 ASSERT_TRUE(rootCertsObj.FindMatchedRoot(cert) == nullptr);
in HWTEST_F() 93 * @tc.steps: step2. input a self sign cert.
in HWTEST_F() 96 cert = HapCertVerifyOpensslUtils::GetX509CertFromPemString(ECC_TEST_CERT);
in HWTEST_F() 97 ASSERT_TRUE(cert != nullptr);
in HWTEST_F() 98 ASSERT_TRUE(rootCertsObj.FindMatchedRoot(cert) == nullptr);
in HWTEST_F() 99 X509_free(cert);
in HWTEST_F() 101 * @tc.steps: step2. input a slft ca sign cert.
in HWTEST_F() 104 cert in HWTEST_F() [all...] |
| /kernel/linux/linux-5.10/arch/s390/boot/ |
| H A D | ipl_report.c | 34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space() 73 for_each_rb_entry(cert, certs) in find_bootdata_space() 74 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space() 75 safe_addr = cert->addr + cert->len; in find_bootdata_space() 95 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 99 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
| /third_party/node/test/parallel/ |
| H A D | test-tls-options-boolean-check.js | 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 44 // Format ['key', 'cert'] 65 ].forEach(([key, cert]) => { 66 tls.createServer({ key, cert }); 70 // Format ['key', 'cert', 'expected message'] 83 ].forEach(([key, cert, index]) => { 86 tls.createServer({ key, cert }); [all...] |
| H A D | test-https-options-boolean-check.js | 25 const certBuff = fixtures.readKey('agent1-cert.pem'); 27 const certBuff2 = fixtures.readKey('ec-cert.pem'); 28 const caCert = fixtures.readKey('ca1-cert.pem'); 29 const caCert2 = fixtures.readKey('ca2-cert.pem'); 44 // Format ['key', 'cert'] 65 ].forEach(([key, cert]) => { 66 https.createServer({ key, cert }); 70 // Format ['key', 'cert', 'expected message'] 84 ].forEach(([key, cert, index]) => { 87 https.createServer({ key, cert }); [all...] |
| /base/request/request/services/src/manage/config/ |
| H A D | cert_manager.rs | 36 self.info.read().unwrap().cert.clone() 46 cert: Option<Vec<Certificate>>, 69 let cert = unsafe { &**item }; in update_system_cert() 70 let cert_slice = unsafe { std::slice::from_raw_parts(cert.data, cert.size as usize) }; in update_system_cert() 72 Ok(cert) => { in update_system_cert() 73 certificates.push(cert); in update_system_cert() 76 error!("parse security cert path failed, error is {:?}", e); in update_system_cert() 85 Ok(cert) => { in update_system_cert() 86 certificates.push(cert); in update_system_cert() [all...] |
| /base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
| H A D | dlp_credential_test.cpp | 88 std::vector<uint8_t> cert; in HWTEST_F() local 89 proxy->OnGenerateDlpCertificate(0, cert); in HWTEST_F() 90 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 91 proxy->OnGenerateDlpCertificate(-1, cert); in HWTEST_F() 92 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 95 proxy->OnParseDlpCertificate(0, policy, cert); in HWTEST_F() 96 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 97 proxy->OnParseDlpCertificate(-1, policy, cert); in HWTEST_F() 98 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 107 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) overrid [all...] |
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument 105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument 206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument 225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument 344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument 374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local [all...] |
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_vfy.c | 26 const OSSL_CMP_MSG *msg, X509 *cert) in verify_signature() 33 if (!ossl_assert(cmp_ctx != NULL && msg != NULL && cert != NULL)) in verify_signature() 40 && (X509_get_key_usage(cert) & X509v3_KU_DIGITAL_SIGNATURE) == 0) { in verify_signature() 45 pubkey = X509_get_pubkey(cert); in verify_signature() 63 res = ossl_x509_print_ex_brief(bio, cert, X509_FLAG_NO_EXTENSIONS); in verify_signature() 100 * certs (possibly including CRLs and a cert verification callback function) 106 X509_STORE *trusted_store, X509 *cert) in OSSL_CMP_validate_cert_path() 112 if (ctx == NULL || cert == NULL) { in OSSL_CMP_validate_cert_path() 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 174 /* Return 0 if skid != NULL and there is no matching subject key ID in cert */ 25 verify_signature(const OSSL_CMP_CTX *cmp_ctx, const OSSL_CMP_MSG *msg, X509 *cert) verify_signature() argument 105 OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx, X509_STORE *trusted_store, X509 *cert) OSSL_CMP_validate_cert_path() argument 206 already_checked(const X509 *cert, const STACK_OF(X509) *already_checked) already_checked() argument 225 cert_acceptable(const OSSL_CMP_CTX *ctx, const char *desc1, const char *desc2, X509 *cert, const STACK_OF(X509) *already_checked1, const STACK_OF(X509) *already_checked2, const OSSL_CMP_MSG *msg) cert_acceptable() argument 344 check_msg_given_cert(const OSSL_CMP_CTX *ctx, X509 *cert, const OSSL_CMP_MSG *msg) check_msg_given_cert() argument 374 X509 *cert = sk_X509_value(certs, i); check_msg_with_certs() local [all...] |
| /third_party/rust/crates/rust-openssl/openssl/src/ |
| H A D | pkcs12.rs | 43 cert: parsed.cert.unwrap(), in parse() 55 let mut cert = ptr::null_mut(); in parse2() variables 62 &mut cert, in parse2() 67 let cert = X509::from_ptr_opt(cert); in parse2() 70 Ok(ParsedPkcs12_2 { pkey, cert, ca }) in parse2() 99 cert: None, in builder() 114 pub cert: X509, 120 pub cert 157 pub fn cert(&mut self, cert: &X509Ref) -> &mut Self { cert() functions [all...] |
| /base/security/code_signature/utils/src/ |
| H A D | openssl_utils.cpp | 40 LOG_ERROR("Fail to create bio for cert.");
in LoadCertFromBuffer() 43 X509 *cert = d2i_X509_bio(mem, nullptr);
in LoadCertFromBuffer() local 44 if (cert == nullptr) {
in LoadCertFromBuffer() 48 return cert;
in LoadCertFromBuffer() 53 X509 *cert = LoadCertFromBuffer(certBuffer.GetBuffer(), certBuffer.GetSize());
in ConvertCertToPEMString() local 54 if (cert == nullptr) {
in ConvertCertToPEMString() 59 X509_free(cert);
in ConvertCertToPEMString() 64 if (!PEM_write_bio_X509(mem, cert)) {
in ConvertCertToPEMString() 77 X509_free(cert);
in ConvertCertToPEMString() 88 for (const ByteBuffer &cert in MakeStackOfCerts() [all...] |
| /foundation/communication/netstack/frameworks/native/net_ssl/ |
| H A D | net_ssl.cpp | 25 uint32_t NetStackVerifyCertification(const CertBlob *cert)
in NetStackVerifyCertification() argument 27 if (cert == nullptr) {
in NetStackVerifyCertification() 31 return VerifyCert(cert);
in NetStackVerifyCertification() 34 uint32_t NetStackVerifyCertification(const CertBlob *cert, const CertBlob *caCert)
in NetStackVerifyCertification() argument 36 if (cert == nullptr || caCert == nullptr) {
in NetStackVerifyCertification() 40 return VerifyCert(cert, caCert);
in NetStackVerifyCertification()
|
| /base/update/updater/services/package/pkg_verify/ |
| H A D | openssl_util.cpp | 103 X509 *cert = PEM_read_bio_X509(pemBio, nullptr, nullptr, nullptr); in GetX509CertFromPemString() local 104 if (cert == nullptr) { in GetX509CertFromPemString() 109 return cert; in GetX509CertFromPemString() 125 X509 *cert = PEM_read_bio_X509(certbio, nullptr, nullptr, nullptr); in GetX509CertFromPemFile() local 126 if (cert == nullptr) { in GetX509CertFromPemFile() 133 return cert; in GetX509CertFromPemFile() 136 bool VerifyX509CertByIssuerCert(X509 *cert, X509 *issuerCert) in VerifyX509CertByIssuerCert() argument 138 if (cert == nullptr || issuerCert == nullptr) { in VerifyX509CertByIssuerCert() 148 bool ret = (X509_verify(cert, pubKey) == 1); in VerifyX509CertByIssuerCert() 265 std::string GetX509CertSubjectName(X509 *cert) in GetX509CertSubjectName() argument 280 GetX509CertIssuerName(X509 *cert) GetX509CertIssuerName() argument [all...] |
| /base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
| H A D | certificate_openssl_common.c | 153 LOGE("Date is null in x509 cert!");
in CompareDateWithCertTime() 160 LOGE("Date is not validate in x509 cert!");
in CompareDateWithCertTime() 163 LOGE("Date is expired in x509 cert!");
in CompareDateWithCertTime() 201 CfResult CompareNameObject(const X509 *cert, const CfBlob *derBlob, X509NameType type, bool *compareRes)
in CompareNameObject() argument 205 name = X509_get_subject_name(cert);
in CompareNameObject() 207 name = X509_get_issuer_name(cert);
in CompareNameObject() 353 bool CheckIsSelfSigned(const X509 *cert)
in CheckIsSelfSigned() argument 355 if (cert == NULL) {
in CheckIsSelfSigned() 359 X509_NAME *issuer = X509_get_issuer_name(cert);
in CheckIsSelfSigned() 366 X509_NAME *subject = X509_get_subject_name(cert);
in CheckIsSelfSigned() 377 CheckIsLeafCert(X509 *cert) CheckIsLeafCert() argument 398 X509 *cert = NULL; STACK_OF() local 439 CheckSelfPubkey(X509 *cert, const EVP_PKEY *pubKey) CheckSelfPubkey() argument 463 X509 *cert = NULL; STACK_OF() local 541 GetSubjectNameFromX509(X509 *cert, CfBlob **sub) GetSubjectNameFromX509() argument 569 GetNameConstraintsFromX509(X509 *cert, CfBlob **name) GetNameConstraintsFromX509() argument [all...] |
| /kernel/linux/common_modules/code_sign/ |
| H A D | code_sign_ioctl.c | 41 code_sign_log_info("cert found"); in matched_cert_search() 46 code_sign_log_error("cert not found"); in matched_cert_search() 90 int cert_chain_insert(struct rb_root *root, struct cert_source *cert) in cert_chain_insert() argument 98 if (!(cert->path_type == RELEASE_DEVELOPER_CODE in cert_chain_insert() 99 || cert->path_type == DEBUG_DEVELOPER_CODE)) { in cert_chain_insert() 100 code_sign_log_error("no permission to insert code %d", cert->path_type); in cert_chain_insert() 110 int result = strcmp(cert->subject, this->subject); in cert_chain_insert() 118 result = strcmp(cert->issuer, this->issuer); in cert_chain_insert() 125 code_sign_log_info("cert already exist in trust sources"); in cert_chain_insert() 132 cert in cert_chain_insert() 143 cert_chain_remove(struct rb_root *root, struct cert_source *cert) cert_chain_remove() argument [all...] |
| /third_party/node/deps/openssl/openssl/crypto/ocsp/ |
| H A D | ocsp_srv.c | 157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument 159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert() 236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument 238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name() 246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument 258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex() 279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument 281 if (cert == NULL) in OCSP_RESPID_set_by_key() 283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key() 286 OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, const char *propq) OCSP_RESPID_match_ex() argument 322 OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) OCSP_RESPID_match() argument [all...] |
| /third_party/openssl/crypto/ocsp/ |
| H A D | ocsp_srv.c | 157 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert) in OCSP_basic_add1_cert() argument 159 return ossl_x509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF); in OCSP_basic_add1_cert() 236 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_name() argument 238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name() 246 int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert, in OCSP_RESPID_set_by_key_ex() argument 258 if (!X509_pubkey_digest(cert, sha1, md, NULL)) in OCSP_RESPID_set_by_key_ex() 279 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert) in OCSP_RESPID_set_by_key() argument 281 if (cert == NULL) in OCSP_RESPID_set_by_key() 283 return OCSP_RESPID_set_by_key_ex(respid, cert, cert in OCSP_RESPID_set_by_key() 286 OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx, const char *propq) OCSP_RESPID_match_ex() argument 322 OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert) OCSP_RESPID_match() argument [all...] |
| /base/request/request/services/src/cxx/ |
| H A D | request_cert_mgr_adapter.cpp | 72 void RequestCertManager::FreeCertData(struct CRequestCert *cert)
in FreeCertData() argument 74 if (cert == nullptr) {
in FreeCertData() 78 if (cert->data != nullptr) {
in FreeCertData() 79 free(cert->data);
in FreeCertData() 80 cert->data = nullptr;
in FreeCertData() 82 cert->size = 0;
in FreeCertData() 83 free(cert);
in FreeCertData() 106 REQUEST_HILOGE("GetUserCertsData, init cert list failed, ret = %{public}d", ret);
in GetUserCertsData() 112 REQUEST_HILOGE("GetUserCertsData, get cert list failed, ret = %{public}d", ret);
in GetUserCertsData() 139 REQUEST_HILOGE("GetUserCertsData, init cert inf in GetUserCertsData() 156 struct CRequestCert *cert = static_cast<struct CRequestCert *>(malloc(sizeof(struct CRequestCert))); GetUserCertsData() local [all...] |
| /third_party/node/src/crypto/ |
| H A D | crypto_common.h | 28 X509Pointer SSL_CTX_get_issuer(SSL_CTX* ctx, X509* cert); 96 X509* cert); 100 X509* cert, 105 X509* cert, 111 X509* cert); 113 v8::MaybeLocal<v8::Value> GetKeyUsage(Environment* env, X509* cert); 119 v8::MaybeLocal<v8::Value> GetSerialNumber(Environment* env, X509* cert); 121 v8::MaybeLocal<v8::Value> GetRawDERCertificate(Environment* env, X509* cert); 127 X509* cert, 131 X509* cert, [all...] |
| /base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
| H A D | napi_x509_certificate.cpp | 54 HcfX509Certificate *cert = nullptr; member 161 HcfX509Certificate *cert = context->certClass->GetX509Cert(); in VerifyExecute() local 162 context->errCode = cert->base.verify(&(cert->base), context->pubKey); in VerifyExecute() 164 LOGE("verify cert failed!"); in VerifyExecute() 165 context->errMsg = "verify cert failed"; in VerifyExecute() 179 HcfX509Certificate *cert = context->certClass->GetX509Cert(); in GetEncodedExecute() local 187 context->errCode = cert->base.getEncoded(&(cert->base), encodingBlob); in GetEncodedExecute() 189 LOGE("get cert encode in GetEncodedExecute() 309 HcfX509Certificate *cert = GetX509Cert(); GetPublicKey() local 352 HcfX509Certificate *cert = GetX509Cert(); CheckValidityWithDate() local 363 HcfX509Certificate *cert = GetX509Cert(); GetVersion() local 372 HcfX509Certificate *cert = GetX509Cert(); GetSerialNumber() local 388 HcfX509Certificate *cert = GetX509Cert(); GetCertSerialNumber() local 409 HcfX509Certificate *cert = GetX509Cert(); GetIssuerName() local 432 HcfX509Certificate *cert = GetX509Cert(); GetSubjectName() local 451 HcfX509Certificate *cert = GetX509Cert(); GetSubjectNameEx() local 470 HcfX509Certificate *cert = GetX509Cert(); GetNotBeforeTime() local 495 HcfX509Certificate *cert = GetX509Cert(); GetNotAfterTime() local 520 HcfX509Certificate *cert = GetX509Cert(); GetSignature() local 543 HcfX509Certificate *cert = GetX509Cert(); GetSigAlgName() local 568 HcfX509Certificate *cert = GetX509Cert(); GetSigAlgOID() local 593 HcfX509Certificate *cert = GetX509Cert(); GetSigAlgParams() local 616 HcfX509Certificate *cert = GetX509Cert(); GetKeyUsage() local 639 HcfX509Certificate *cert = GetX509Cert(); GetExtendedKeyUsage() local 658 HcfX509Certificate *cert = GetX509Cert(); GetBasicConstraints() local 672 HcfX509Certificate *cert = GetX509Cert(); GetSubjectAlternativeNames() local 695 HcfX509Certificate *cert = GetX509Cert(); GetIssuerAlternativeNames() local 752 HcfX509Certificate *cert = GetX509Cert(); ToString() local 769 HcfX509Certificate *cert = GetX509Cert(); HashCode() local 820 HcfX509Certificate *cert = GetX509Cert(); GetExtensionsObject() local 860 HcfX509Certificate *cert = GetX509Cert(); GetIssuerX500DistinguishedName() local 897 HcfX509Certificate *cert = GetX509Cert(); GetSubjectX500DistinguishedName() local 939 HcfX509Certificate *cert = GetX509Cert(); GetCRLDistributionPointsURI() local 957 HcfX509Certificate *cert = GetX509Cert(); MatchProc() local [all...] |
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_cert.c | 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 135 OPENSSL_malloc(cert in ssl_cert_dup() [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_cert.c | 85 CERT *ssl_cert_dup(CERT *cert) in ssl_cert_dup() argument 96 ret->key = &ret->pkeys[cert->key - cert->pkeys]; in ssl_cert_dup() 104 if (cert->dh_tmp != NULL) { in ssl_cert_dup() 105 ret->dh_tmp = cert->dh_tmp; in ssl_cert_dup() 109 ret->dh_tmp_cb = cert->dh_tmp_cb; in ssl_cert_dup() 110 ret->dh_tmp_auto = cert->dh_tmp_auto; in ssl_cert_dup() 113 CERT_PKEY *cpk = cert->pkeys + i; in ssl_cert_dup() 132 if (cert->pkeys[i].serverinfo != NULL) { in ssl_cert_dup() 135 OPENSSL_malloc(cert in ssl_cert_dup() [all...] |
| /third_party/node/deps/openssl/openssl/crypto/pkcs12/ |
| H A D | p12_crt.c | 18 X509 *cert, 38 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex() 63 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex() 68 if (pkey && cert) { in PKCS12_create_ex() 69 if (!X509_check_private_key(cert, pkey)) in PKCS12_create_ex() 71 if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) in PKCS12_create_ex() 75 if (cert) { in PKCS12_create_ex() 77 name = (char *)X509_alias_get0(cert, &namelen); in PKCS12_create_ex() 82 pkeyid = X509_keyid_get0(cert, &pkeyidlen); in PKCS12_create_ex() 85 bag = pkcs12_add_cert_bag(&bags, cert, nam in PKCS12_create_ex() 37 PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype, OSSL_LIB_CTX *ctx, const char *propq) PKCS12_create_ex() argument 148 PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) PKCS12_create() argument [all...] |